nccgroup / SolitudeLinks
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
☆372Updated 4 years ago
Alternatives and similar repositories for Solitude
Users that are interested in Solitude are comparing it to the libraries listed below
Sorting:
- Harden your Chrome browser via enterprise policy.☆290Updated 2 years ago
- Learning Shodan through katas☆465Updated 4 years ago
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- A research-based pihole list to reduce tracking by Apple and Google☆319Updated 2 years ago
- OS image for the PiRogue based on Debian 12☆159Updated 11 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆717Updated this week
- Private key usage verification☆431Updated 2 months ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆250Updated last year
- Utility to find AES keys in running processes☆336Updated 2 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Repository demonstrating the Capital One breach on your AWS account☆243Updated 4 years ago
- A Passive SSH back-end and scanner.☆102Updated this week
- Discover internet-wide misconfigurations while drinking coffee☆395Updated 4 years ago
- Web on top of any protocol☆114Updated 5 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆263Updated this week
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆283Updated last year
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆315Updated 2 months ago
- Minimum Viable Secure Product mvsp.dev☆193Updated 6 months ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆473Updated 2 years ago
- Fast HTTP enumerator☆484Updated 2 months ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- Get Your 3D Printed High Security Key☆142Updated 3 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Russian Keyboard Registry Script☆105Updated 4 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆298Updated 5 months ago